Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Operational changes:
These changes are due to operational level changes in process .manage by operation
staff .
61. Types of changes Proactive/ Reactive
Proactive change:
Changes done for business benefits. Improve service and improve cost efficiency
Reactive change:
Change to resolve the error.
62. Types of testing.
1.Accessibility testing.
2.Usability testing.
3.Process and procedure testing.
4.Volume stress load and scalability testing.
5.Compatibility testing.
63. Knowledge management.
Store quality, reliable information.
Secure information.
64. Different knowledge management system .
CMIS Capacity Management information system.
AMIS Availability management .
KEDB Known error database.
CMDB Configuration management database.
DML Definitive media library
SKMS service knowledge management system
Q1. If we used an external organisation to help us develop part of our service, what would that be
called?
Q2. Can you name a risk that might occur whilst designing a service?
Q9. What type of information would you store in the Service Catalogue?
Q12. What are the steps you would follow when a Change Request comes in?
A1
Outsourcing
A2
Risks can come in many different forms including; financial markets, failures with IT or business
projects, legal liabilities, credit risk, accidents and mistakes, natural causes and disasters as well as
deliberate attacks from an adversary such as hacking.
A3
A4
Typically, an SLA is made up of any of the following:
1.Service name
2.Clearance information (with location and date)
3.Contract duration
4.Description/ desired customer outcome
5.Service and asset criticality
6.Reference to further contracts which also apply (e.g. SLA Master Agreement)
7.Service times
8.Required types and levels of support
9.Service level requirements/ targets
10.Mandated technical standards and specification of the technical service interface
11.Responsibilities
12.Costs and pricing
13.Change history
14.List of annexes
A5
SACM stands for Service Asset and Configuration Management. By capturing information and keeping
it up to date, we help people make informed decisions at the right time. In addition, providing
accurate configuration information can proactively help resolve incidents and problems much faster.
A6
The Operational Level Agreement is an agreement between an IT service provider and another part of
the same organization. This could be the development team, the support team or helpdesk
A7
Critical Success Factor (CSF) is the term for an element that is necessary for an organization or project
to achieve its mission. It is what drives the company forward through its strategy.
A8
An SDP is produced for each new IT service, major change, or IT service retirement.
A9
The Service Catalogue contains a list of services that an organization provides, often to its employees
or customers. For each service within the catalogue, we typically include description, timeframes or
SLA for fulfilling the service, owners (who is entitled to request/view the service), costs and how to
fulfil the service.
A10
Attachment sizes for mailboxes
A11
We use Change Management to standardize our methods and procedures for dealing with changes
and thereby reducing risk and disruption. We record all changes to assets or confirmation items in the
Configuration Management System. This allows us to define and agree on those changes and ensure
that only people who have the appropriate authority can make changes.
A12
Record it
Evaluate it
Prioritize it
Plan it
Test it
Finally, implement it
A13
Unique identification for the release
Type of release (minor, major, beta, alpha etc)
Naming conventions for the release e.g. dates, times, version numbers
Description of the release
Roles for each stage of the release
Expected frequency
Mechanisms to build, install and distribute the release (focusing on re-use and efficiency
here)
Criteria for acceptance of the release into various environments (test, training, live etc.)
A14
Service package
SLP
Interface definitions for the service provider
Release plans
Acceptance criteria
A15
All of these are types of testing:
Usability testing
Accessibility testing
Process testing
Stress and load testing
Availability testing
Compatibility testing
Security testing
Regression testing
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1.How does ITIL help to reduce costs and minimize total cost of ownership (TCO) for IT
investments?
IT investments and staff always find that they break their work timelines. This happens since the
unscheduled work always takes priority over the work that is planned. ITIL can help an organization
stop this continuous cycle and can therefore, help employees focus on the Total Cost of Ownership
(TCO) and other activities in their department.
2.Who decides the categorization of a proposed change within an ITIL compliant Change
Management process?
It is the task of Change Manager
A Change Manager will plays a key role in ensuring that the projects (change initiatives) meet their
objectives within timelines and said budgets by increasing employee adoption and usage. This person
will focus on the peoples side of change, including changes to business processes, systems and
technology, job roles and organization structures.
3.After a Change has been implemented, an evaluation is performed. What is this evaluation
called?
It is known as Post Implementation Review (PIR)
PIR is an assessment and review of the complete working solution. It will be performed after a period
are supported by information security procedures that identify key activities required to implement
relevant information security policies.
15.What is a balanced scorecard?
Balanced scorecard is a strategic planning and management system that is used extensively in business
and industry, government, and nonprofit organizations worldwide to align business activities to the
vision and strategy of the organization, improve internal and external communications, and monitor
organization performance against strategic goals.
16.What is a Service Request?
Service requests are a formal request submitted by a user for some type of service, software, or
hardware. A Service request generally refers to something the user wants and/or needs but does not
already have, such as a printer or laptop. Service requests often involve items that are already
approved. For instance, if it is a company policy that all employees get access to the cloud-based CRM
system, and someone from the marketing department sends a service request for access to the CRM,
this does not need any additional approval. The IT help desk can simply fulfill this request.
17.What type of information is stored in a CMDB?
CMDB contains contents that are intended to hold a collection of IT assets commonly referred to as
configuration items (CI) as well as descriptive relationships between such assets. When populated, the
repository becomes a means of understanding how critical assets such as information systems are
composed, what are their upstream sources or dependencies, and what are their downstream targets.
18.Is there a trade-off between return and risk?
According to modern portfolio theory, there is a trade-off between risk and return. All other factors
being equal, if a particular investment incurs a higher risk of financial loss for prospective investors,
those investors must be able to expect a higher return in order to be attracted to the higher risk.
In majority of cases, even though there is no promise of higher returns on risky assets, so the higher
risk just tends to scare off potential investors, keeping the returns on a given investment low. The only
investments that can really try to promise higher returns for higher risk are bonds, and even then the
higher returns wont be generated if the issuing organization goes default.
19.What is the difference between end-users and customers?
End-User An end user or end customer directly receives the service or employs the product. End
users are not the only customers as there may be intermediate entities like purchasing departments,
whose expectations or needs must be carried forward through a series of service contracts or
requirement definitions.
Customer A customer may or may not have the ability to choose between different products and
suppliers. For instance- In monopoly situations like local telephone and cable television services, there
are scenarios when end users do not make the purchasing decision. It may include Clients of social
service agencies or court-appointed lawyers or employees of an organization where the purchasing
department makes the choices.
20.How is IT Service Continuity Management (ITSCM) related to Business Continuity Planning
(BCP)?
IT Service Continuity is a subset of Business Continuity Planning (BCP) and encompasses IT disaster
recovery planning and wider IT resilience planning. It also incorporates those elements of IT
infrastructure and services that relate to communications such as (voice) telephony and data
communications.
It is a systematic process to prevent, predict and manage Information and Communications Technology
(ICT) disruption and incidents, which have the potential to disrupt ICT services and should result in a
Information Technology Infrastructure Library or ITIL is a set of procedures that companies use
to implement, architect, and manage IT software and hardware. ITIL is managed by a team,
and you could find yourself interviewing for a team of project managers who put together
documentation either internally or through a consulting company. Here are some interview
questions you should prepare for when searching the job market.
1. What are some risks when you design an API or outside library architecture?
A: The API can be hacked, a DDoS can bring down the servers that host the API or privacy can
be compromised. Its important to distinguish the pros and cons between internal and
external architecture and privacy.
2. What is SLA?
A: A service level agreement or SLA is the contract between an organization and its
customers. Customers can be external or internal and SLA tells the user what to expect in
regards to response time and uptime of any IT technology.
3. What can you use to manage SLA and employees?
A: Most companies use some kind of ticketing system whether its an internal ticket system
programmed by developers or third part ticketing systems that manage SLA and requests.
4. What is an IT policy?
A: An IT policy manages the way communication and storage work. For instance, one IT policy
can be email attachment sizes. You can restrict email attachment sizes to avoid having users
that take too much space on your server storage space.
5. What is change management?
A: Change management is a group of people who identify and approve changes to the
system. Change management helps all parties involved to review the changes that will take
place and approve them to ensure that changes to not have a severe negative impact on the
system.
6. What are some informational assets that must be included with change
management?
A: The requestor should include who will implement the changes, the hardware that is
affected, any software changes, who made the changes, and any organizations that could be
impacted by the changes.
7. What type of testing should happen before changes occur?
A: A QA or quality analysis process is a way to create scripts and use cases to cover any input
from a given user. This QA process ensures that bugs and errors do not severely impact the
organization and any issues are handled within the code.
8. What are some types of testing that are done to software and hardware?
A: Stress testing checks concurrent connections and slowness, security testing tests for
security, usability tests for user interface and usability, and compatibility tests for the
operating system and browsers software is compatible with.
9. What does an SLA contain?
A: The SLA contains the amount of time a response is made when issues occur, the
responsibility of each organization, target numbers and uptime percentages, the times at
which support is available, and any change history or technical standards provided by the
organization.
10. What is a service design package?
A: The SDP contains any major change requirements for new IT service and information when
retiring any hardware or software.
Have you been having trouble setting yourself apart from other candidates in your ITIL
interviews? If so, you should consider earning a ITIL certification to set yourself apart from the
crowd. Fill out the form below for a course syllabus and pricing information on our instructor
lead, live online and self paced training options.